Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

This paper of us is published as an open access publication at EURASIP Journal of Wireless Communications. Following is the paper abstract:

Widespread adoption of cloud computing has increased the attractiveness of such services to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud’s bandwidth, services and resources to render the cloud unavailable to both cloud providers, and users are a common form of attacks. In recent times, feature selection has been identified as a pre-processing phase in cloud DDoS attack defence which can potentially increase classification accuracy and reduce computational complexity by identifying important features from the original dataset during supervised learning. In this work, we propose an ensemble-based multi-filter feature selection method that combines the output of four filter methods to achieve an optimum selection. We then perform an extensive experimental evaluation of our proposed method using intrusion detection benchmark dataset, NSL-KDD and decision tree classifier. The findings show that our proposed method can effectively reduce the number of features from 41 to 13 and has a high detection rate and classification accuracy when compared to other classification techniques.


1 Comment

Ali Dehghantanha

Dr. AliDehghantanha (www.alid.info) has served for more than a decade in a variety of industrial and academic positions with leading players in Cyber-Security and E-Commerce. He has long history of working in different areas of computer security as security researcher, malware analyzer, penetration tester, security consultant, professional trainer, and university lecturer. Ali is imminently qualified in the field of cyber security; he has an EU Marie Curie post-doctoral fellowship in cyber forensics (the Marie Curie Fellowships are Europe’s most competitive and prestigious award), Ph.D in Security in Computing and a number of professional qualifications namely SANS-GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), SANS-GIAC Reverse Engineering Malware (GREM), SANS-GIAC Certified Forensics Analyst (GCFA), CCFP (Certified Cyber Forensic Professional), CISSP (Certified Information Systems Security Professional), and CEH (Certified Ethical Hacker). Ali is a fellow of the UK Higher Education Academy (HEA) and served as a keynote speaker for a number of security conferences namely the International Conference on Information Security and Cyber Forensics (InfoSec2015) speaking about “Detection and analysis IoT Malwares" at Cape-Town, South Africa, keynote speaker at the International Conference on Information Security and Digital Forensics (ISDF2015) speaking on "Efficient Analysis of Malware Campaigns" at Kuala Lumpor, Malaysia and invited speaker for ISACA EuroCACS/ISRM 2015 speaking about "Finding the Needle in Internet of Everything Haystack" at Copenhagen, Denmark. In 2015, he was an invited speaker for ISACA North-West UK meeting and talked about "Strategic Cyber Threat Intelligence".  He was one of the lead editors for Elsevier book titled “Contemporary digital forensic investigations of cloud and mobile applications” and a guest editor for a special issue on “Internet of Things: Security and Forensics Trends and Challenges” in the Elsevier Future Generation Computer Systems journal, guest editor for a special issue on "Big Data Applications in Cyber Security and Threat Intelligence" in IEEE Transactions on Big Data.  Ali is the founder of annual “International Conference in Cyber-Security, Cyber Warfare and Digital Forensics (CyberSec)” and served as editor in chief for the International Journal of Cyber Security and Digital Forensics (IJCSDF) between Jan 2012 to Jan 2015!